• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: vulnerabilities

A close-up of a technician’s hands typing and navigating through troubleshooting steps on a computer in a well-lit office. , natural light, soft shadows, with copy space

Five Ways to Reduce Desktop Support Troubleshooting Time

Gartner predicts digital employee experiences (DEX) will be crucial for IT by 2025. Here's five strategies to streamline desktop support for seamless operations.

October 21, 2024 Jeff Johnson Leave a Comment

Gartner predicts digital employee experiences (DEX) will be crucial for IT by 2025. Here’s 5 strategies to streamline desktop support for seamless operations.

Read More

Cybersecurity and information or network protection. Future technology web services for business and internet project

CrowdStrike Cyber Armageddon: How Do Firms Now Build Resilience?

Post-Quantum's Anderson Cheng writes how the CrowdStrike chaos prompts IT leaders to rethink of cloud strategies.

September 13, 2024 Andersen Cheng Leave a Comment

Towards the end of July, a botched software update at cyber security firm CrowdStrike caused chaos around the world, crippling IT systems that we all relied on. The disruption spanned across sectors; flights were grounded, patients were unable to contact healthcare services and customers were unable to make card payments. The event illustrated two things: […]

Read More

the generation with the worst password hygiene, Video Surveillance Trends 2021

Keeping Your Hybrid Workplace Secure

NetSupport's Matt Jones shares insights on enhancing security, ensuring seamless operations, and boosting productivity in a hybrid work environment.

July 12, 2024 Matt Jones Leave a Comment

The ravages of COVID-19 are now an afterthought in many people’s minds. But the pandemic’s disruptive impact on the workplace is far from done. This is especially true when it comes to the new hybrid workforce and technology challenges around systems support, device management and security. Specifically, workers experienced the personal benefits of flexibility that […]

Read More

White House AI Regulations, ChatGPT, Generative AI

5 Things You Need to Know About the White House Executive Order on Artificial Intelligence

Keysight Technologies' Jennifer Mullen highlights the key takeaways from the White House's Executive Order on AI.

February 28, 2024 Guest Authors Leave a Comment

With the launch of artificial intelligence (AI) programs like ChatGPT, it seems clear that AI has entered the zeitgeist. A host of questions and concerns about AI’s security and privacy features have arisen as its use becomes more ubiquitous. In October 2023, the White House issued an Executive Order on Safe, Secure, and Trustworthy Artificial […]

Read More

NSA Programming Languages

Rising Ransomware, Supply Chain Disruptions & Geopolitical Issues Complicate Cybersecurity

TXOne Networks findings underscore the need for cybersecurity systems detection and response for combatting both known and unknown threats.

February 20, 2024 TD Staff Leave a Comment

Cyber-physical systems security provider TXOne Networks recently published its 2023 annual report detailing a growing range of cybersecurity issues facing global industries. The Crisis of Convergence: OT/ICS Cybersecurity 2023, which is available for free download, “details diverse intensifying challenges, including growth in attacks via Ransomware-as-a-Service (RaaS) models, exploitation of supply chain vulnerabilities and prevalence of state-sponsored hackers and […]

Read More

DDoS, NETSCOUT Arbor Insight

7 Layers of DDoS Attacks and How To Prevent Them

DDoS attacks can derail profits; safeguard your business against them with these prevention methods across different layers.

December 28, 2023 Mia Turlington Leave a Comment

As businesses grow to gain traction and revenue from the Internet, the increasing reliance is an easy target for Distributed Denial of Service (DDoS) attacks. Like any new venture, risks are an undeniable part that comes with it. For eCommerce businesses, the main risk is DDoS attacks. Known as a dangerous and malicious attack to […]

Read More

Progress MOVEit vulnerability

Progress Software Urges Further Action to Prevent MOVEit Exploitation

Defending against exploitation of MOVEit vulnerabilities gets more complicated as Progress Software issues another patch.

June 16, 2023 Zachary Comeau Leave a Comment

The MOVEit Transfer story continues to plague IT departments and security professionals as Progress Software has issued another advisory, urging organizations to apply yet another patch to address a privilege escalation flaw in its Transfer product. The company’s update comes amid reports of widespread exploitation, including several at several U.S. agencies that were breached as […]

Read More

June 2023 Patch Tuesday. Patch Tuesday,

June 2023 Patch Tuesday: Exchange Server, SharePoint, PGM

The June 2023 Patch Tuesday release includes no active threats, but critical vulnerabilities still need to be patched, experts say.

June 13, 2023 Zachary Comeau Leave a Comment

Microsoft has released fixes for about 70 vulnerabilities for its June 2023 Patch Tuesday release, and while none are listed as being actively exploited of publicly known, there are still a handful of critical-rated vulnerabilities that IT admins should prioritize this month. That list of bugs that should be prioritized includes two remote code execution […]

Read More

Fortinet Vulnerability, Fortigate

Patch FortiGate SSL-VPN Devices Immediately

Fortinet is urging organizations to apply a patch to fix a critical vulnerability in its FortiGate SSL-VPN devices.

June 13, 2023 Zachary Comeau Leave a Comment

Cybersecurity firm Fortinet is warning organizations of a critical vulnerability in its FortiGate SSL-VPN devices, continuing a string of recent exploitations of vulnerabilities in similar devices due to their internet-facing nature and access to a victim’s network. The vulnerability–tracked as CVE-2023-27997–is a heap-based overflow flaw that could allow a remote attacker to execute arbitrary code […]

Read More

InfoComm Logo

InfoComm 2023 to Bridge AV/IT Gap with New Enterprise IT Program

InfoComm 2023 introduces a new enterprise IT program, featuring workshops, training, education sessions with expert speakers from Google and Microsoft.

June 9, 2023 TD Staff Leave a Comment

InfoComm 2023 will introduce a brand-new enterprise IT program focusing on AV and IT convergence, its obstacles, and trends at the show June 10-16 (exhibits 14-16) at the Orange County Convention Center in Orlando, Fla. The program will feature 30 workshops, manufacturers’ training, education sessions featuring speakers from Google to Microsoft, and a show floor […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Interim pages omitted …
  • Page 64
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSEVENT STANDARDS OF CONDUCTYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.